Youssef Moukadem

Cybersecurity Enthusiast | Computer Science Graduate | Cloud Enthusiast | Lifelong Learner

View on GitHub

πŸ“ Case Study: The Greenholt Phish

πŸ”Ή Overview

In this case study, I investigated a suspicious email received by a sales executive.
The executive was not expecting this email, which mentioned a money transfer and contained an unexpected attachment. This scenario simulated a phishing attempt.

Skills demonstrated:


πŸ” Key Activities & Highlights

1. Email Timestamp

Findings:


2. Email Sender

Findings:


3. Reply-To Address

Findings:


4. Originating IP

Findings:


5. SPF & DMARC Records

Findings:


6. Attachment Analysis

sha256sum SWT_#09674321__PDF.CAB

Findings:


βœ… Conclusion

Lessons Learned:


πŸ”— Navigation